Global Industrial Cyber Security Professional (GICSP)

Start Date: January 01, 1970 – 12:00 AM (Pacific Time)

End Date: January 01, 1970 – 12:00 AM (Pacific Time)

$2,499.00

*Looking for flexible schedule (after hours or weekend)? Please call or email us: 858-208-4141 or sales@ccslearningacademy.com.
Student financing options are available.

Transitioning military and Veterans, please contact us to sign up for a free consultation on training and hiring options.
Qty:
Category:

Download PDF of Course Details

Course Description:

The GICSP bridges together IT, engineering and cyber security to achieve security for industrial control systems from design through retirement. This unique vendor-neutral, practitioner focused industrial control system certification is a collaborative effort between GIAC and representatives from a global industry consortium involving organizations that design, deploy, operate and/or maintain industrial automation and control system infrastructure. GICSP will assess a base level of knowledge and understanding across a diverse set of professionals who engineer or support control systems and share responsibility for the security of these environments.

Areas Covered

  • Industrial control system components, purposes, deployments, significant drivers, and constraints
  • Control system attack surfaces, methods, and tools
  • Control system approaches to system and network defense architectures and techniques
  • Incident-response skills in a control system environment
  • Governance models and resources for industrial cybersecurity professionals

Who is GICSP for?

  • ICS IT practitioners (includes operational technology support)
  • ICS Security analysts (includes operational technology security)
  • Security engineers
  • Industry managers and professionals

Requirements

  • 1 proctored exam
  • 115 questions
  • Time limit of 3 hours
  • Minimum Passing Score of 71%

Delivery

NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE. Click here for more information.

GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt.

Exam Certification Objectives & Outcome Statements

The topic areas for each exam part follow:

Hardening ICS Operating Systems
The candidate will be able to describe how to implement endpoint security software along with hardening and patching, to secure the Windows and Unix style operating systems commonly found in an ICS environment.
ICS Communications and Compromises
The candidate will be able to describe the basic structures, protocols, and defense of communications within an ICS and summarize how they can be compromised. The candidate will also be able to, at a basic level, describe the cryptography used to protect communications.
ICS Intelligence Gathering
The candidate will be able to determine the threat landscape of an ICS through the investigation of information leakage points and logs, and honeypots, when appropriate.
ICS Level 0 and 1 Technology Overview and Compromise
The candidate will be able to describe level 0 and level 1 devices and technologies and summarize how those devices and technologies are targeted and attacked.
ICS Level 2 and 3 Technology Overview and Compromise
The candidate will be able to describe level 2 and level 3 devices and technologies and summarize how those devices and technologies are targeted and attacked.
ICS Overview and Concepts
The candidate will be able to summarize the function of high-level assets that comprise Purdue model levels zero through three. The candidate will be able to compare and contrast DCS systems with SCADA systems.
ICS Procurement, Architecture, and Design Fundamentals
The candidate will be able to compare and contrast ICS architectures with traditional IT architectures. The candidate will demonstrate understanding of how procurement and physical security can complement a secure and defendable ICS network architecture. The candidate will be able to summarize the use of levels and zones in defining a secure ICS architecture as well as the devices deployed at each level and zone.
ICS Program and Policy Development
The candidate will be able to summarize the steps and best practices used in building a security program and creating enforceable security policies for an ICS.
ICS Wireless Technologies and Compromises
The candidate will be able to summarize the different wireless communication technologies used in an ICS, how they are targeted, and how they can be defended.
Risk Based Disaster Recovery and Incident Response
The candidate will be able to describe how risk is measured and how it can be used to inform disaster recovery and incident response.

*No Specific training is required for any GIAC certification. There are many sources of information available regarding the certification objectives’ knowledge areas. Practical experience is an option; there are also numerous books on the market covering Computer Information Security. Another option is any relevant courses from training providers, including SANS.*

Inclusions

With CCS Learning Academy, you’ll receive:

  • Exam scheduling support*
  • Enjoy job placement assistance for the first 12 months after course completion.
  • This course is eligible for CCS Learning Academy’s Learn and Earn Program: get a tuition fee refund of up to 50% if you are placed in a job through CCS Global Tech’s Placement Division*
  • Government and Private pricing available.*

*For more details call: 858-208-4141 or email: training@ccslearningacademy.com; sales@ccslearningacademy.com